{"id":"https://openalex.org/W7124948394","doi":"https://doi.org/10.1007/s44443-026-00470-7","title":"Bridging packet and session: Cross-level dual-attention networks for encrypted traffic classification","display_name":"Bridging packet and session: Cross-level dual-attention networks for encrypted traffic classification","publication_year":2026,"publication_date":"2026-01-20","ids":{"openalex":"https://openalex.org/W7124948394","doi":"https://doi.org/10.1007/s44443-026-00470-7"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-026-00470-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00470-7","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s44443-026-00470-7","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068433623","display_name":"Jieming Gu","orcid":"https://orcid.org/0000-0002-2466-988X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jieming Gu","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China","School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]},{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123385939","display_name":"Yue Zhong","orcid":null},"institutions":[{"id":"https://openalex.org/I177955009","display_name":"China University of Political Science and Law","ror":"https://ror.org/00e49gy82","country_code":"CN","type":"education","lineage":["https://openalex.org/I177955009"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Zhong","raw_affiliation_strings":["Institute of Evidence Law and Forensic Science, China University of Political Science and Law, Beijing, China","Key Laboratory of Evidence Science, China University of Political Science and Law, Ministry of Education, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Evidence Law and Forensic Science, China University of Political Science and Law, Beijing, China","institution_ids":["https://openalex.org/I177955009"]},{"raw_affiliation_string":"Key Laboratory of Evidence Science, China University of Political Science and Law, Ministry of Education, Beijing, China","institution_ids":["https://openalex.org/I177955009"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123442826","display_name":"Xiangzhan Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangzhan Yu","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5123442826"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20368867,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.002199999988079071,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.0005000000237487257,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6707000136375427},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.5612999796867371},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4896000027656555},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.47510001063346863},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.45739999413490295},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4147999882698059},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.36629998683929443},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.35420000553131104}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.734000027179718},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6707000136375427},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.5612999796867371},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4896000027656555},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.47510001063346863},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.45739999413490295},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45100000500679016},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4147999882698059},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.36629998683929443},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.358599990606308},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.35420000553131104},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.35280001163482666},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.31769999861717224},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3089999854564667},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.29980000853538513},{"id":"https://openalex.org/C176809094","wikidata":"https://www.wikidata.org/wiki/Q15401496","display_name":"Traverse","level":2,"score":0.29170000553131104},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2913999855518341},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.29030001163482666},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.2784999907016754},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.2680000066757202},{"id":"https://openalex.org/C2780310539","wikidata":"https://www.wikidata.org/wiki/Q12547192","display_name":"Imperfect","level":2,"score":0.26080000400543213},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25360000133514404}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-026-00470-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00470-7","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a44cebd1c5f24be29612e657418c9cd7","is_oa":true,"landing_page_url":"https://doaj.org/article/a44cebd1c5f24be29612e657418c9cd7","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 38, Iss 3 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-026-00470-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00470-7","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.6673542261123657,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W1988790447","https://openalex.org/W2000756828","https://openalex.org/W2008056655","https://openalex.org/W2107699930","https://openalex.org/W2112796928","https://openalex.org/W2190207511","https://openalex.org/W2295321789","https://openalex.org/W2295598076","https://openalex.org/W2302255633","https://openalex.org/W2343828539","https://openalex.org/W2537766808","https://openalex.org/W2591712613","https://openalex.org/W2743678626","https://openalex.org/W2911964244","https://openalex.org/W2919493784","https://openalex.org/W2955058313","https://openalex.org/W2963750397","https://openalex.org/W2982387504","https://openalex.org/W3007562398","https://openalex.org/W3025787173","https://openalex.org/W3048832564","https://openalex.org/W3120227884","https://openalex.org/W3145680685","https://openalex.org/W3166930713","https://openalex.org/W3177145331","https://openalex.org/W3178547917","https://openalex.org/W3189612867","https://openalex.org/W3205483739","https://openalex.org/W3206111957","https://openalex.org/W4224315052","https://openalex.org/W4232312162","https://openalex.org/W4281623355","https://openalex.org/W4308085999","https://openalex.org/W4312893735","https://openalex.org/W4319966459","https://openalex.org/W4367047070","https://openalex.org/W4389747887","https://openalex.org/W4390603704","https://openalex.org/W4391019849","https://openalex.org/W4391952532","https://openalex.org/W4392940028","https://openalex.org/W4393409607","https://openalex.org/W4394911570","https://openalex.org/W4396973073","https://openalex.org/W4399555917","https://openalex.org/W4400648123","https://openalex.org/W4400839333","https://openalex.org/W4401908411","https://openalex.org/W4406416118","https://openalex.org/W4406854500","https://openalex.org/W4407286598","https://openalex.org/W4407566333","https://openalex.org/W4407939342","https://openalex.org/W4409369257","https://openalex.org/W4409762632","https://openalex.org/W4410723822","https://openalex.org/W4411672620"],"related_works":[],"abstract_inverted_index":{"The":[0],"widespread":[1],"adoption":[2],"of":[3,11,98,163],"encryption":[4],"technologies":[5],"has":[6],"greatly":[7],"increased":[8],"the":[9,76,102,149,161],"complexity":[10],"network":[12,117],"traffic":[13,46,168],"classification,":[14],"as":[15,19],"plaintext":[16],"features":[17],"such":[18],"DNS":[20],"are":[21],"increasingly":[22],"unavailable.":[23],"Traditional":[24],"payload-based":[25],"approaches":[26],"fail":[27],"under":[28],"strong":[29],"encryption,":[30],"while":[31,128],"statistical":[32],"and":[33,65,90,125,136,143,151],"deep":[34],"learning":[35,122,165],"methods":[36],"relying":[37],"on":[38,148],"single-level":[39],"information":[40,141],"often":[41],"struggle":[42],"to":[43,68],"capture":[44,69],"comprehensive":[45,70],"patterns.":[47],"To":[48],"address":[49],"these":[50],"challenges,":[51],"we":[52],"propose":[53],"Cross-Level":[54],"Encrypted":[55],"Traffic":[56],"(CLET),":[57],"a":[58,94,107,114],"novel":[59],"classification":[60],"model":[61],"that":[62,155],"integrates":[63],"session-level":[64],"packet-level":[66],"representations":[67],"patterns":[71],"in":[72],"encrypted":[73,167],"traffic.":[74],"At":[75,101],"session":[77],"level,":[78,104],"CLET":[79,105,139,156],"constructs":[80],"an":[81],"87-dimensional":[82],"attribute":[83,110],"set":[84,111],"encompassing":[85],"certificate":[86],"characteristics,":[87],"temporal":[88,124],"behaviors,":[89],"spatial":[91,126],"distributions,":[92],"providing":[93],"robust":[95],"global":[96,135],"view":[97],"each":[99],"flow.":[100],"packet":[103],"introduces":[106],"compact":[108],"13-dimensional":[109],"processed":[112],"by":[113],"hybrid":[115],"CNN-Transformer":[116],"with":[118],"dual":[119],"attention":[120],"mechanisms,":[121],"fine-grained":[123],"dependencies":[127],"avoiding":[129],"redundant":[130],"information.":[131],"By":[132],"jointly":[133],"leveraging":[134],"local":[137],"representations,":[138],"mitigates":[140],"loss":[142],"enhances":[144],"feature":[145],"discriminability.":[146],"Experiments":[147],"LFETT2021":[150],"ISCX-VPN":[152],"datasets":[153],"show":[154],"outperforms":[157],"state-of-the-art":[158],"baselines,":[159],"demonstrating":[160],"effectiveness":[162],"cross-level":[164],"for":[166],"classification.":[169]},"counts_by_year":[],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2026-01-21T00:00:00"}
